essential of cyber security Flashcards

(25 cards)

1
Q

What is cybersecurity?

A

The practice of protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Cybersecurity only involves protecting personal information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the CIA triad stand for in cybersecurity?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: A __________ is a malicious software designed to harm, exploit, or otherwise compromise a computer system.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a firewall?

A

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is a common type of cyber attack? A) Phishing B) Gardening C) Cooking D) Painting

A

A) Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of encryption in cybersecurity?

A

To convert information or data into a code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Strong passwords are a crucial element of cybersecurity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ‘social engineering’ refer to in cybersecurity?

A

Manipulating individuals into divulging confidential or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: A __________ attack involves overwhelming a system with traffic to render it unusable.

A

Denial-of-Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is multi-factor authentication?

A

A security system that requires more than one form of verification to access an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Which of the following is NOT a type of malware? A) Ransomware B) Spyware C) Firewall D) Worm

A

C) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of an incident response team?

A

To prepare for, detect, and respond to cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Regular software updates are important for cybersecurity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does phishing typically involve?

A

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: __________ is a type of malware that encrypts files and demands payment to restore access.

17
Q

What is an intrusion detection system (IDS)?

A

A device or software application that monitors a network or systems for malicious activity or policy violations.

18
Q

Multiple Choice: What does VPN stand for? A) Virtual Private Network B) Very Private Network C) Variable Public Network D) Verified Private Network

A

A) Virtual Private Network

19
Q

What is the principle of least privilege?

A

The practice of limiting access rights for accounts to the bare minimum permissions they need to perform their functions.

20
Q

True or False: Cybersecurity is only the responsibility of the IT department.

21
Q

What is the purpose of a security policy?

A

To outline the rules and procedures for maintaining security within an organization.

22
Q

Fill in the blank: __________ is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability of unfortunate events.

A

Risk management

23
Q

What is a DDoS attack?

A

A Distributed Denial-of-Service attack that uses multiple compromised systems to flood a target with traffic.

24
Q

Multiple Choice: Which of the following is a technique used to protect against data breaches? A) Data Loss Prevention B) Data Expansion C) Data Compression D) Data Duplication

A

A) Data Loss Prevention

25
What is a security breach?
An incident that results in unauthorized access to data, applications, services, or devices.